Information System Security Chapter 1
Which of the three protections ensures that only authorized parties can view information? a. confidentiality b. availability c. security d. integrity
a. confidentiality
What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it? a. silver bullet b. unicorn c. approved action d. secure solution
a. silver bullet
What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents? a. cybercriminal b. cyberterrorism c. cracking d. hacking
b. cyberterrorism
Which term below is frequently used to describe the tasks of securing information that is in a digital format? a. network security b. info security c. logical security d. physical security
b. info security
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024? a. 27 b. 10 c. 18 d. 15
c. 18
Which of the following ensures that data is accessible to authorized users? a. integrity b. identify c. availability d. confidentiality
c. availability
What level of security access should a computer user have to do their job? a. limiting amount b. authorized access c. least amount d. password protected
c. least amount
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? a. $50,000 b. $250,000 c. $500,000 d. $1,500,000
d. $1,500,000
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information? a. Sarbanes Oxley b. USA Patriot c. California Database Security Breach d. Gramm-Leach-Bliley
d. Gramm-Leach-Bliley
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes? a. nation state threats b. state hackers c. cyber military d. nation state actors
d. nation state actors